Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY) | Mandiant
Common Information
Type Value
UUID 4fc46eba-ffd7-42d1-82b6-fac48c4bac61
Fingerprint 64cdb41056336ff0
Analysis status DONE
Considered CTI value 1
Text language
Published April 3, 2017, midnight
Added to db Nov. 6, 2023, 7:09 p.m.
Last updated Nov. 17, 2024, 6:54 p.m.
Headline Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY)
Title Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY) | Mandiant
Detected Hints/Tags/Attributes 54/1/3
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 330 Threat Intelligence https://www.mandiant.com/resources/blog/rss.xml 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details File 240
wmic.exe
Details File 50
urlmon.dll
Details Threat Actor Identifier - APT 665
APT29